Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper we introduce a new secure cryptographic scheme, named IES-CBIR, specifically designed for images and their outsourced storage and retrieval in large private image repositories. Our solution enables both encrypted storage and querying using Content Based Image Retrieval (CBIR), while preserving privacy. We have implemented a prototype system around the proposed scheme, and experimentally analyzed its performance when compared to similar proposals for privacy-preserving image retrieval. Our results show that IES-CBIR allows more efficient operations than existing proposals, both in terms of time and space overheads, while enabling less restrictive application scenarios. LookInside Chapter Metrics Downloads100 Provided byBookmetrix Other actions Export citation About this Book Reprints and Permissions Add to Papers Share Share this content on FacebookShare this content on TwitterShare this content on LinkedIn
Original languageEnglish
Title of host publicationData Privacy Management, Autonomous Spontaneous Security, and Security Assurance
PublisherSpringer
Pages311-318
ISBN (Electronic)978-3-319-17016-9
ISBN (Print)978-3-319-17015-2
DOIs
Publication statusPublished - 2015
EventDPM 2014 - 9th International Workshop on Data Privacy Management, ESORICS 2014 -
Duration: 1 Jan 2014 → …

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Number8872
ISSN (Print)0302-9743

Conference

ConferenceDPM 2014 - 9th International Workshop on Data Privacy Management, ESORICS 2014
Period1/01/14 → …

Fingerprint Dive into the research topics of 'Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties'. Together they form a unique fingerprint.

  • Cite this

    Domingos, H. J. L. (2015). Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (pp. 311-318). (Lecture Notes in Computer Science; No. 8872). Springer. https://doi.org/10.1007/978-3-319-17016-9_20